Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cybercriminals targeted Polish businesses with Agent Tesla and Formbook malware
Global Security

Cybercriminals targeted Polish businesses with Agent Tesla and Formbook malware

AdminBy AdminJuly 30, 2024No Comments3 Mins Read
Agent Tesla and Formbook Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 30, 2024Ravi LakshmananMalware/cyber threats

Agent Tesla and Formbook malware

Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024, which led to the deployment of several malware families, such as Tesla agent, Formand Remcos RAT.

According to cybersecurity firm ESET, some other regions targeted include Italy and Romania.

“The attackers used previously compromised email accounts and company servers not only to distribute malicious emails, but also to host malware and collect stolen data,” ESET researcher Jakub Kalach said in a report released today.

Cyber ​​security

Spread over nine waves, these campaigns are distinguished by the use of a malware downloader named DBatLoader (aka ModiLoader and NatsoLoader) to deliver the final payloads.

The Slovak cyber security company said it marks a move away from previous attacks observed in the second half of 2023, which used a crypto-as-a-service (CaaS) called AceCryptor to distribute Remcos RAT (aka Rescoms).

“In the second half (2023), Rescoms became the most common AceCryptor-packaged malware family,” ESET noted in March 2024. “Over half of these attempts occurred in Poland, followed by Serbia, Spain, Bulgaria and Slovakia.”

The starting point of the attacks were phishing emails with RAR or ISO attachments containing malware that, when opened, activated a multi-step process to download and launch the Trojan.

Agent Tesla and Formbook malware

In cases where an ISO file was attached, this would directly execute DBatLoader. The RAR archive, on the other hand, contained a confusing Windows batch script containing a Base64-encoded ModiLoader executable disguised as PEM-encoded list of revoked certificates.

Based on Delphi, DBatLoader is primarily designed to download and launch the next stage of malware either from Microsoft OneDrive or from compromised servers owned by legitimate companies.

No matter what malware is deployed, the Agent Tesla, Formbook, and Remcos RATs have the ability to sift through sensitive information, allowing threat actors to “set the stage for their next campaigns.”

This comes after Kaspersky discovered that small and medium-sized businesses are increasingly being targeted by cybercriminals due to a lack of robust cyber security measures, as well as limited resources and expertise.

“Trojan attacks remain the most common cyber threat, indicating that attackers continue to target small and medium-sized businesses and prefer malware over unwanted software,” the Russian security vendor said. said the last month.

“Trojans are particularly dangerous because they mimic legitimate software, making them harder to detect and prevent. Their versatility and ability to bypass traditional security measures make them a common and effective tool for cyber attackers.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.